Try Our New BETA Version
Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Search Results
Results: 1 through 50 of 897 (0.284 secs)
You searched for: subject:"detection"
[1] 2 3 4 5 6 7 8 9 10 11     Next    Last
[texts]Notes on search, detection and localization modeling - Forrest, R. N. 1925-
Title from cover
Downloads: 40
[texts]Automated life detection devices - Shneour, E. A
No Abstract Available
Downloads: 40
[texts]Some notes on search, detection and localization modeling - Forrest, R. N., 1925-
Title from cover
Downloads: 40
[texts]Notes on search, detection and localization modeling - Forrest, R. N. 1925-
(Revised October 1987).
Downloads: 43
[texts]A program to compute magnetic anomaly detection probabilities - Forrest, R. N., 1925-
Title from cover
Downloads: 69
[audio]Hit Detection Episode 3
Ep3 of Hit Detection
Keywords: hit detection
Downloads: 4
[audio]Hit Detection Episode 2 - Hit Detection
Hit Detection Episode 2
Keywords: Hit Detection
Downloads: 54
[audio]Hit Detection 1 - Hit Detection Podcast
Episode #1 of Hit Detection
Keywords: Hit Detection
Downloads: 48
[texts]Surveillance Detection
Surveillance DetectionSurveillance DetectionSurveillance DetectionSurveillance Detection, surveillance detection, surveillance detection route, surveillance detection app, surveillance detection course, surveillance detection training, surveillance detection run, surveillance detection jobs, surveillance detection devices, surveillance detection definition, surveillance detection softwareIt is inside this light that some individuals think that tips and strategies are not universal...
Keywords: Surveillance Detection
[texts]Audio detection algorithms - Neta, Beny.;Mansager, Bard K.
Title from cover
Downloads: 50
[texts]Part 4 Phy 310 - Dr. Mohamed Salem
Detectora and Accelerators
Keywords: Radiation Detection
Downloads: 118
[texts]ASRgeneticcrater 2013
research paper
Keywords: crater detection
Downloads: 23
[texts]Intrusion Detection using C4.5: Performance Enhancement by Classifier Combination
Data Security has become a very critical part of any organizational information system. Intrusion Detection System (IDS) is used as a security measure to preserve data integrity and system availability from various attacks. This paper evaluates the performance of C4.5 classifier and its combination using bagging, boosting and stacking over NSL- KDD dataset for IDS. This dataset set consists of selected records of the complete KDD dataset.
Keywords: Intrusion Detection
Downloads: 275
[texts]Radiation Detection And Measurement Glenn F. Knoll 3rd Ed 1999
Radiation Detection
Keywords: radiation; detection
Downloads: 1,504
[movies]Pool Leak Detection Service - Leak Masters
We are prominent leak Detection Company in Charleston. We use latest technology to detect leaks in swimming pool. Roof top, walls. We are very reasonable with our charges. So, for an effective treatment of any severe or simple type of leakage that you are facing, just contact us we will make sure that we fix it for you.
Keywords: Under Slab Leak Detection; Slab Leaks Detection
Downloads: 13
[texts]15. Eng Cyst Detection In MRI Brain Image Vrushali D. Dharmale - Vrushali D. Dharmale & P. A. Tijare
In medical diagnosis, the cyst detection in human brain is very difficult and intricate task. The task has been carried out by the help of image processing to make simple and easier. Since a long period of time, image processing has helped a lot for various pathological tasks and still an emerging area of research. Medical diagnosis became fast due to such type of advanced techniques. In this work, an approach has been attempted to detect the cyst in the MRI brain image...
Keywords: Cyst Detection; Diagnosis; Segmentation; Edge Detection
Downloads: 9
[texts]Water Leakage Detection Services in Tampa
Leak Tracker will find your leak whether it is above or below ground without damaging your property or disrupting your business.
Keywords: Leak detection Tampa; Leak detection Tampa Bay
Downloads: 34
[movies]Kontrols & Industrial Weighing - Max Raine
Kontrols and Industrial Weighing has been serving for the development and working new industrial project supports. The support and quality of products and services makes them prominent in this field.
Keywords: Food metal detection
Downloads: 4
[texts]Detection of suspected nodes in MANET
Mobile ad hoc network (MANETs) is an emergingarea with practical applications. One such field concernsmobile ad hoc networks (MANETs) in which mobile nodesorganize themselves in a network without the help of anypredefined infrastructure. Securing MANETs is an importantpart of deploying and utilizing them, since them are oftenused in critical applications where data and communicationsintegrity in important...
Keywords: MANET; Intrusion detection; AODV
Downloads: 8
[texts]Abnormality Detection in Electrocardiograms by - Bachir Boucheham
Electrocardiogram (ECG) morphology deviation from normal beat is a sign of abnormal behavior and a significant information for cardiologist to depict cardiac diseases. Most existing methods for such a task use single beat classification with various tools. However, these approaches usually ignore the repetitive nature of the ECG. In this study, we adapt and apply a previously developed method for quasi-periodic time series comparison (SEA) to detect the morphology change in the ECG...
Keywords: Electrocardiograms (ECG); Anomaly Detection
Downloads: 185
[texts]Possible application of electronic devices to forest fire detection (Volume no.91) - Hirsch, Stanley N
Caption title
Keywords: Forest fires Detection
Downloads: 21
[audio]American Leak Detection - Zia Sheikh
Conversation between customer and ALD with the manager clearly stating that if a leak is not found, customer doesn't pay anything.
Keywords: American Leak Detection
Downloads: 16
[movies]Effective And Expert Commercial Leak Detection Services In UK
Looking for expert leak detection and prevention services for your commercial properties in UK? “Thornton Consulting” specialises in leak locating and analysing leaks in buildings and other waterproof structures. To know more, visit
Keywords: leak detection UK
Downloads: 6
[texts]Edge Detection
Edge Detection Free DownloadDetect the corners of the object in the image.Edge DetectionEdge Detection, edge detection, edge detection matlab, edge detection opencv, edge detection python, edge detection photoshop, edge detection java, edge detection circuit, edge detection matlab code, edge detection javascript, edge detection methodsVersion 1.0Edge Detection 2015 download : Edge Detection ] License! FREE DOWNLOADIf you can receive one of these with each meal or snack we eat, a results may be a...
Keywords: Edge Detection Download
[texts]A program to compute electric anomaly detection probabilities - Forrest, R. N., 1925-
Cover title
Downloads: 45
[texts]Assumed Design Scenarios - Vyas, Hemali
This chapter begins by describing an assumed communication scenario for human and robotic exploration of Mars. It is followed by a scenario relating to the CEV that will carry humans to and from Mars. These two scenarios capture the key aspects of communication needs for Mars mission support. The Mars exploration communication scenario has been derived from a strawman set of requirements for human and robotic missions in the 2020 to 2030 timeframe found in references 2-1, and 2-2...
Downloads: 129
[texts]Surveillance Detection
Surveillance DetectionSurveillance DetectionWe need to avoid that big tax bill by getting sound financial advice first. Whichever technique you look at it, surviving a break up is not effortless. But, somewhat than depend on emotion, I prefer a more scientific approach. You are able to give it a try plus change the Surveillance Detection numbers to fit the Surveillance Detection own max speed. These are generally involved and everyone is expecting a marriage...
Keywords: Surveillance Detection Review
Downloads: 3
[audio]Intrusion Detection Systems
To be viewed in conjunction with the slides on slideshare
Keywords: Intrusion Detection Systems
Downloads: 29
[texts]Stop and Look Detection Algorithm - Andrus, Alvin F.
Title from cover
Downloads: 56
[texts]Motion Detection System
Motion Detection System Free DownloadGet a Matlab source code for motion detection system.Motion Detection SystemMotion Detection System, motion detection system, motion detection system project, motion detection system security camera, motion detection system and method, motion detection system ppt, motion alarm system, motion alarm systems home, motion alarm system for car, motion detection security system, motion detection alarm systemVersion 1.0Motion Detection System Go Here for Motion Dete...
Keywords: Motion Detection System Download
[texts]Motion Detection
Motion Detection Capture still pictures and create AVI files from motions detected using a Web cam.Motion DetectionMotion Detection, motion detection camera, motion detection lights, motion detection, motion detection software, motion detection webcam, motion detection security camera, motion detection algorithm, motion detection alarm, motion detection opencv, motion detection light bulbsVersion 1.04 buMotion Detection Motion Detection * MEDIAFIRERather its a serious question that deserves a se...
Keywords: Motion Detection Free
[texts]Monocoil reciprocating permanent magnet electric machine with self-centering force - NON
A linear reciprocating machine has a tubular outer stator housing a coil, a plunger and an inner stator. The plunger has four axially spaced rings of radially magnetized permanent magnets which cooperate two at a time with the stator to complete first or second opposite magnetic paths. The four rings of magnets and the stators are arranged so that the stroke of the plunger is independent of the axial length of the coil.
Downloads: 156
[texts]Analysis of unattended ground sensors in theater Missile Defense Attack Operations - Haberlin, Richard J.
Thesis advisor, Kneale T. Marshall
Downloads: 175
[texts]Tubercle bacilli in butter : their occurrence, vitality and significance (Volume no.127) - Schroeder, Ernest Charles.

Keywords: Microorganisms Detection; Butter Analysis
Downloads: 11
[texts]3. Humanities A Study Of Image Processing In Analyzing Tree Ring P. Meenakshi Sundari - P. MEENAKSHI SUNDARI & S. BRITTO RAMESH KUMAR
This paper describes the design and implementation of an interactive image analysis system for dendrochronology, tree ring structure. Image processing is the highest level of the evolution of imaging techniques. New qualities are brought to imaging systems by digital computers and processors. Image processing has various application fields. Such application is tree ring analysis. It determines the living period of trees and all the factors affecting the tree...
Keywords: Dendrochronology; Segmentation; Edge Detection
Downloads: 12
[texts]Active sonar detection and signal excess fluctuations - Forrest, R. N., 1925-
Title from cover
Downloads: 166
No Abstract Available
Downloads: 109
[movies]Link Detection And Removal Made Easy
Free Ebook for Link Detection and Removal for Fighting Web SPAM by 1SEO1. Do it yourself Guide to remove website poor/bad backlinks and free tool to get a quote if want us our SEO Expert to do it.
Keywords: Bad Link removal; Bad Link Detection; Free Ebook Link Detection
Downloads: 14
[texts]Observation of the 3He(n,tp) reaction by detection of far-ultraviolet radiation (Volume 113)
Journal of Research of the National Institute of Standards and Technology
Keywords: Lyman alpha radiation; 3He; neutron detection; thermal neutron detection
Downloads: 166
[texts]Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm - Jothi Lakshmi U
With the increase in the use of internet, the job of malicious people has been made easy to exploit vulnerabilities in existing system. Intrusion Detection System (IDS) plays a major role in computer/network security in recognizing such malicious activity called intrusion. IDSs’ quick and correct detection of unknown intrusions help in reducing damage/loss to the sensitive information. IDS with such quality need to be encouraged...
Keywords: Intrusion Detection; Feature Relevance; Negative Selection; Anomaly Based Intrusion Detection
Downloads: 50
[texts]Benefit of sound cueing in combat simulation - Neta, Beny.;Mansager, Bard K.
Technical report for period July 1993 - October 1993.
Downloads: 50
[texts]Detection of near atmospheric disturbances and weather conditions (pelengovaniye blizhnikh atmosferikov i pogodnyye usloviya) - Kamaldina, I. I
Relation of storm and shower observations detection data to meteorological data
Downloads: 128
[texts]FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
In this paper, we propose an agreement-based fault  detection and recovery protocol for cluster head (CH) in wireless sensor networks (WSNs) of two level cluster hierarchy. The aim of protocol is to accurately detect CH failure to avoid unnecessary energy consumption caused by a mistaken detection process. For this, it allows each cluster member to detect its CH failure independently. Cluster members employ distributed agreement protocol to reach an agreement on failure of the CH among multiple...
Keywords: Wireless Sensor Network; Clustering; detection; Agreement protocol; Detection accuracy
Downloads: 50
[movies]Radon Detection Utah - Radon Detection When it comes to radon detection in Utah, there is no better company to call than Greene's Inc. They have the experience and equipment necessary to ensure that they detect even the slightest amount of radon in your area. They have spent years in the concrete and radon detection industry, so they can provide the radon detection services you need to give you the peace of mind you want...
Keywords: Radon Detection Utah; Radon Mitigation in Utah; Radon Detection UT
Downloads: 7
[texts]An Accident Detection System on Highway through CCTV with Calogero‐Moser System
There are many limits such as shadowing occlusion and nolights in the video image detector systems. In order to makeaccurate detector system, we need to get rid of theseproblems specially accident detection system by usingvehicle trace. In this paper, we introduce a method toovercome shadow and nighttime has been introduced aswell as the accurate accident detection system. We find theflow of vehicle trace is such as level spacing distribution asWigner distribution...
Keywords: Accident Detection System; Detection Abrupt Signal; Calogero‐ Moser System
Downloads: 59
[movies]Underground Leak Detection Houston TX | 713-338-2088 | ZippyLeak - ZippyLeak
Save money today and hire leak detection contractors with ZippyLeak. All Leak detection services are available at much less prices and one can get discount on all our detection services everytime. So, call today, save money on leak detection services.
Keywords: underground leak detection houston tx; water leak detection houston tx
Downloads: 4
[audio]Hit Detection Episode #5
Episode 5 of the Hit Detection gaming podcast.
Keywords: hit detection; video games; podcast
Downloads: 19
[texts]7. Applied Blood Cells Detectio Zainab Nayyar
Image processing techniques are widely used in the domain of medical sciences for detecting various diseases, infections, tumors, cell abnormalities and various cancers. Detecting and curing a disease on time is very important in the field of medicine for protecting and saving human life. There are three types of primary cells in human body red blood cells, white blood cells and platelets. Their functionalities are different...
Keywords: Red Blood Cells; Detection; Counting
Downloads: 3
[texts]29. Comp Sci Determining Mahendra Eknath Pawar 1
Sybil attacks are one of the well-known and powerful attacks against OSNs. The malicious attacker generates a Sybil group, and pretends to be multiple, distinct users (called Sybil users). Sybil attacks have several harms in OSNs. Dangerous is that multiple Sybil users collude together and form a Sybil group. In this project, we present the first attempt to identify and validate Sybil groups in online social network...
Keywords: Detection; Validation; Online Social Networks
Downloads: 9
[texts]Spectral Detection of Human Targets - Dalton Rosario
A three-stage algorithm suite is proposed for a specific human target detection scenario, where a visible/near infrared hyperspectral (HS) sample is assumed to be available as the only cue from a reference image frame. The suite first applies a biometric based human skin detector to focus the attention of the search. Using as reference all of the bands in the spectral cue, the suite follows with a Bayesian Lasso inference stage designed to isolate pixels representing the specific material type c...
Keywords: Human Target Detection; VNIR; Hyperspectral
Downloads: 22
[1] 2 3 4 5 6 7 8 9 10 11     Next    Last
Advanced search

Group results by:

> Relevance

Related mediatypes


Terms of Use (31 Dec 2014)